IT Infrastructure - AusEd Case Study for Proposed Network Design
VerifiedAdded on 2023/06/12
|13
|2813
|387
AI Summary
This case study discusses the proposed network design for AusEd, including the networking devices used, logical system design, budget cost, and justification for selected hardware brands. The three-layered hierarchical model is used for the network design, with an emphasis on security and future scalability. The cost of the networking devices is also provided.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IT Infrastructure
AusEd Case Study for the proposed network design
MAY 21, 2018
student name
Student ID
AusEd Case Study for the proposed network design
MAY 21, 2018
student name
Student ID
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction.................................................................................................................................................1
Description of the Project............................................................................................................................2
Purpose and Scope of the Problem.............................................................................................................2
Assumptions and the scope of the system..................................................................................................3
Networking Devices Used............................................................................................................................3
System Logical Design..................................................................................................................................5
Budget Cost, Quantity and Specifications of the networking devices..........................................................7
Justification of the selected Hardware’s brand...........................................................................................9
Conclusion...................................................................................................................................................9
References.................................................................................................................................................10
List of Figures
Figure 1 the logical diagram........................................................................................................................6
Figure 2 three layered hierarchical network design....................................................................................7
Introduction.................................................................................................................................................1
Description of the Project............................................................................................................................2
Purpose and Scope of the Problem.............................................................................................................2
Assumptions and the scope of the system..................................................................................................3
Networking Devices Used............................................................................................................................3
System Logical Design..................................................................................................................................5
Budget Cost, Quantity and Specifications of the networking devices..........................................................7
Justification of the selected Hardware’s brand...........................................................................................9
Conclusion...................................................................................................................................................9
References.................................................................................................................................................10
List of Figures
Figure 1 the logical diagram........................................................................................................................6
Figure 2 three layered hierarchical network design....................................................................................7
Introduction
When we want to understand how an IT infrastructure is arranged and laid it is good we know the needs
of the organization. The first step is analyzing the existing equipment’s in the organization and this will
help in knowing what we will use and what we will not. Understanding how data is transmitted then it
will be easy for us to know what to require in helping us send and receive information. The second step
is underlining all the AusEd requirements and fro there we can start planning of the project where we
will do a feasibility study and do an analysis of what to expect. The statistics used and gathered will be
used in coming up with a logical diagram clearly showing all the significant and most used devices in the
design of the network that is to be setup. Lastly is that when designing the plan and the model of a
network it will be wise for one to consider some of the major factors like security, financial policy of the
institution in terms of the budget allocation, how resilient, scalability and future flexibility of the
network and how easy the network will be when it comes to managing such networks (Leon, 2015)..
The management will be tested when troubleshooting in case an error occur.
Description of the Project
The big idea here in AusEd is that they really require a system that can help them in maintaining the
system in accounting that will help to improve the customer relationships where they have purposed to
use the sugar customer relationship management and Microsoft exchange server 2007 which will be
used in sending, receiving and storage of emails in the system of email. Having over 2000 students in the
premise and others externally doing long distant and about 100 staffs working which is inclusive of the
lecturers who does the course delivery, sales and the operations team and the management AusEd will
need to perform comprehensive analysis that is based on the number of students who will need a
computer, the staff who will need a work station, other basic equipment’s that are multi-accessed by all
the people which may include photocopiers, printers, scanners and the Iphones.
For the above understanding then we will need to develop an IT infrastructure layout that will assist us
to create a plan of what we intend to achieve. In the logic diagram we purpose to explain what are some
of the networking gadgets used are and how they are interconnected with each other clearly showing
how information is transmitted from networking device to the other and the way the networks security
devices such as firewalls and VPNs are implanted in to the system.
When we want to understand how an IT infrastructure is arranged and laid it is good we know the needs
of the organization. The first step is analyzing the existing equipment’s in the organization and this will
help in knowing what we will use and what we will not. Understanding how data is transmitted then it
will be easy for us to know what to require in helping us send and receive information. The second step
is underlining all the AusEd requirements and fro there we can start planning of the project where we
will do a feasibility study and do an analysis of what to expect. The statistics used and gathered will be
used in coming up with a logical diagram clearly showing all the significant and most used devices in the
design of the network that is to be setup. Lastly is that when designing the plan and the model of a
network it will be wise for one to consider some of the major factors like security, financial policy of the
institution in terms of the budget allocation, how resilient, scalability and future flexibility of the
network and how easy the network will be when it comes to managing such networks (Leon, 2015)..
The management will be tested when troubleshooting in case an error occur.
Description of the Project
The big idea here in AusEd is that they really require a system that can help them in maintaining the
system in accounting that will help to improve the customer relationships where they have purposed to
use the sugar customer relationship management and Microsoft exchange server 2007 which will be
used in sending, receiving and storage of emails in the system of email. Having over 2000 students in the
premise and others externally doing long distant and about 100 staffs working which is inclusive of the
lecturers who does the course delivery, sales and the operations team and the management AusEd will
need to perform comprehensive analysis that is based on the number of students who will need a
computer, the staff who will need a work station, other basic equipment’s that are multi-accessed by all
the people which may include photocopiers, printers, scanners and the Iphones.
For the above understanding then we will need to develop an IT infrastructure layout that will assist us
to create a plan of what we intend to achieve. In the logic diagram we purpose to explain what are some
of the networking gadgets used are and how they are interconnected with each other clearly showing
how information is transmitted from networking device to the other and the way the networks security
devices such as firewalls and VPNs are implanted in to the system.
Purpose and Scope of the Problem.
The main reason for giving a future plan with regard to the design of the network in AusEd is to help
them to achieve their strategic plans which is to increase their diversifying sources of funds and to
minimize the cost of all the non-core activities. Also when we understand their technology plan will
assist them in future in developing an offline Moodle for students and the add-on Moodle for taking
exams.
.
Understanding the objectives of each and every organization that is in need of setting the network
layout will be greatly on the basis of security and future extensions (Coleman, 2012). Designing the
network it will be good also to consider the management of the network especially in situations where
we anticipate to have problems in future. Security is one of the key requirements in any network design
layout and when data is being transmitted then we will need to filter and provide the integrity and the
confidentiality of the data being transmitted at all times across the entire network. The devices to help
in providing the confidentiality and filtering of data are such as the Virtual Private networks and the
firewalls.
Assumptions and the scope of the system
In any setup of a network we must make any assumptions in the context in cases where we have used
the diagram. We have assumed that AusEd will need to expand its network so we have used 3-Layered
Hierarchical model with an anticipation that we will scale the size of the network. The cost for the
networking devices is not the actual estimate but just an approximate of the anticipated price.
Networking Devices Used
In networking there are some gadgets or equipment’s that are used for networking and interconnecting
across the network. Some of the networking devices have been listed and explained below as shown
below.
1. Router- this a device that is used in connecting the LAN to the internet. The ISP uses the router
to communicate with their clients who has a network.
The main reason for giving a future plan with regard to the design of the network in AusEd is to help
them to achieve their strategic plans which is to increase their diversifying sources of funds and to
minimize the cost of all the non-core activities. Also when we understand their technology plan will
assist them in future in developing an offline Moodle for students and the add-on Moodle for taking
exams.
.
Understanding the objectives of each and every organization that is in need of setting the network
layout will be greatly on the basis of security and future extensions (Coleman, 2012). Designing the
network it will be good also to consider the management of the network especially in situations where
we anticipate to have problems in future. Security is one of the key requirements in any network design
layout and when data is being transmitted then we will need to filter and provide the integrity and the
confidentiality of the data being transmitted at all times across the entire network. The devices to help
in providing the confidentiality and filtering of data are such as the Virtual Private networks and the
firewalls.
Assumptions and the scope of the system
In any setup of a network we must make any assumptions in the context in cases where we have used
the diagram. We have assumed that AusEd will need to expand its network so we have used 3-Layered
Hierarchical model with an anticipation that we will scale the size of the network. The cost for the
networking devices is not the actual estimate but just an approximate of the anticipated price.
Networking Devices Used
In networking there are some gadgets or equipment’s that are used for networking and interconnecting
across the network. Some of the networking devices have been listed and explained below as shown
below.
1. Router- this a device that is used in connecting the LAN to the internet. The ISP uses the router
to communicate with their clients who has a network.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2. Switch- a switch helps to enhance how flexible and scalable the network is when configuring.
They usually have ports where the devices connectors are connected so that they can access the
network.
3. Cables- the cables used in this department are for connecting the devices, workstations, the
printers and scanners.
4. Server- servers are used for the storage and resource sharing in the network of AusEd. There are
so many uses of servers where they are categorized with regards to their purpose (Maggie,
2014). They are so many servers depending on the task they perform in the IT infrastructure.
Application Server- this a program in a pc in a distributed network offering
provision for the business logic in any application program.
Proxy Server – server software acting as an intermediary between computers
which acts as the end device and the other servers where requests are be
requested.
Mail Server- also an application that is used for receiving the email from the loca
users
They are other major servers that are located in the data center that AusEd will need in making this
implementations of such a plan a success.
Dynamic Host Configuration Server (DHCP)- this is a server that is used for assigning
IP addresses of all the devices connected to the network automatically.
Domain Name Server (DNS) - a server that is used to match the domain names with
their associated IP addresses across the entire network.
File Server- a server hardware that stores and manages the resources that are
transferred across the network of AusEd.
Mail Server- this a server hardware that manages the movement of resources to be
in specific the emails by ensuring that the emails are stored immediately and that
they work efficiently.
Web server- server used for hosting the website files and serving it through a
website where all the individuals doing distant learning from AusEd can access the
information. AusEd can use the webserver technology in giving an updating of a very
serious information (AdminMuba, 2015).
They usually have ports where the devices connectors are connected so that they can access the
network.
3. Cables- the cables used in this department are for connecting the devices, workstations, the
printers and scanners.
4. Server- servers are used for the storage and resource sharing in the network of AusEd. There are
so many uses of servers where they are categorized with regards to their purpose (Maggie,
2014). They are so many servers depending on the task they perform in the IT infrastructure.
Application Server- this a program in a pc in a distributed network offering
provision for the business logic in any application program.
Proxy Server – server software acting as an intermediary between computers
which acts as the end device and the other servers where requests are be
requested.
Mail Server- also an application that is used for receiving the email from the loca
users
They are other major servers that are located in the data center that AusEd will need in making this
implementations of such a plan a success.
Dynamic Host Configuration Server (DHCP)- this is a server that is used for assigning
IP addresses of all the devices connected to the network automatically.
Domain Name Server (DNS) - a server that is used to match the domain names with
their associated IP addresses across the entire network.
File Server- a server hardware that stores and manages the resources that are
transferred across the network of AusEd.
Mail Server- this a server hardware that manages the movement of resources to be
in specific the emails by ensuring that the emails are stored immediately and that
they work efficiently.
Web server- server used for hosting the website files and serving it through a
website where all the individuals doing distant learning from AusEd can access the
information. AusEd can use the webserver technology in giving an updating of a very
serious information (AdminMuba, 2015).
5. Access Devices- these are the devices used for communicating over the network of AusEd. Some
of these devices include Iphones, computers, printers, photocopiers and scanners.
6. Security Devices- these are devices that are used for providing security to the data that is being
transmitted across the network. In the case of AusEd we have considered two networking
devices for security namely the VPNs and the Firewall.
Virtual Private Network Device which is kind of a security tech that is used we want
to create a network connection which will be safe and with that is known for its
encryption capabilities making the entire network to be very secure especially when
there are more than 1000 hosts.
Firewall which is a hardware that is planted on the router that will help in enforcing
and making the rules of data packets when they are entering and leaving the
network. Firewall in the router to filter the traffic as it lowers the risks that may be
brought about by the travelling packets over the public internet and impacting it to
the security of AusEd network.
7. Transceiver- a wireless access point device that is used when we need to broadcast the WI-FI
signals across the entire network of AusEd making all users to be able to access the wireless
connections for those who have the computers and the smartphones.
8. There are other devices that will be used to work with the specific connections and some of
these though not major are such as the
Hub
Gateways
Repeaters
Modems
RJ connectors
Scanners
Photocopiers
Specific laptops for the admin
Projectors
Video conferencing gadgets
IP Iphones
of these devices include Iphones, computers, printers, photocopiers and scanners.
6. Security Devices- these are devices that are used for providing security to the data that is being
transmitted across the network. In the case of AusEd we have considered two networking
devices for security namely the VPNs and the Firewall.
Virtual Private Network Device which is kind of a security tech that is used we want
to create a network connection which will be safe and with that is known for its
encryption capabilities making the entire network to be very secure especially when
there are more than 1000 hosts.
Firewall which is a hardware that is planted on the router that will help in enforcing
and making the rules of data packets when they are entering and leaving the
network. Firewall in the router to filter the traffic as it lowers the risks that may be
brought about by the travelling packets over the public internet and impacting it to
the security of AusEd network.
7. Transceiver- a wireless access point device that is used when we need to broadcast the WI-FI
signals across the entire network of AusEd making all users to be able to access the wireless
connections for those who have the computers and the smartphones.
8. There are other devices that will be used to work with the specific connections and some of
these though not major are such as the
Hub
Gateways
Repeaters
Modems
RJ connectors
Scanners
Photocopiers
Specific laptops for the admin
Projectors
Video conferencing gadgets
IP Iphones
System Logical Design
The explanation of a diagram that is to be used by AusEd which will use the hierarchical design model.
Figure 1 the logical diagram
As seen from the diagram above there are so many computers and laptops that are used for accessing
the access layer which acts as the end user connected via the switch using the cables such as the
Ethernet. Dynamic Host Configuration Protocol is a server that is used for assigning the IP addresses to
all the workstations connected to the network automatically (Macken, 2016). The DNS server is used
for matching the web files for hosting the website of AusEd (Meena, 2017).
In demonstration of the AusEd network the network design have to be broken in to different layers
where each and every layer is specified to perform functions that will help in simplifying the design of
the design making it easy in scaling and managing the network (CISCO, 2014).
The explanation of a diagram that is to be used by AusEd which will use the hierarchical design model.
Figure 1 the logical diagram
As seen from the diagram above there are so many computers and laptops that are used for accessing
the access layer which acts as the end user connected via the switch using the cables such as the
Ethernet. Dynamic Host Configuration Protocol is a server that is used for assigning the IP addresses to
all the workstations connected to the network automatically (Macken, 2016). The DNS server is used
for matching the web files for hosting the website of AusEd (Meena, 2017).
In demonstration of the AusEd network the network design have to be broken in to different layers
where each and every layer is specified to perform functions that will help in simplifying the design of
the design making it easy in scaling and managing the network (CISCO, 2014).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Figure 2 three layered hierarchical network design
In the hierarchical design model the three layer fuctions in the following ways from the access layer to
the core layer.
1. Access layer- this is a layer that offers the provision that directly connects the end user to the
network.
2. Distribution layer is a layer that connects all the devices used in the access layer where they are
enabled to the access layer and their associated services (Cisco, 2013).
3. Core Layer- a layer that help to connects all the devices in the distribution layer to very large
Local Area Network in AusEd.
As seen in the diagram above we shown the presence of the said servers and how they communicate
with the other devices. This is just a draft of the small organization network design plan.
In the hierarchical design model the three layer fuctions in the following ways from the access layer to
the core layer.
1. Access layer- this is a layer that offers the provision that directly connects the end user to the
network.
2. Distribution layer is a layer that connects all the devices used in the access layer where they are
enabled to the access layer and their associated services (Cisco, 2013).
3. Core Layer- a layer that help to connects all the devices in the distribution layer to very large
Local Area Network in AusEd.
As seen in the diagram above we shown the presence of the said servers and how they communicate
with the other devices. This is just a draft of the small organization network design plan.
Budget Cost, Quantity and Specifications of the
networking devices.
Networking
Device
Manufactur
e
Specs Quantity TOTAL Cost (Dollars
$)
Computers Dell Core i7 of 7th Generation
1TB, 2.9 GHZ with a turbo of up to 4
GHZ.
8GB RAM with a hard disk RPM of
about 7200
1200 900,000
Laptops HP Core i7
Hard disk storage of about 500Gb
and a processor of 3.4ghz.
16 GB RAM and supports wireless
connections.
NVIDIA950 display is supported.
50 100,000
Servers IBM Servers come in many varieties and
can be such as the file, web, dynamic
host configuration protocol, DNS and
the proxy servers.
7 9800
Switch Cisco Each will have 48 ports each with an
Ethernet base of about base
30 30000
Iphones cisco - screen display of about 5” with a
graphical TFT color display.
- Support codec G.450 of up to
G.722
150 250,000
networking devices.
Networking
Device
Manufactur
e
Specs Quantity TOTAL Cost (Dollars
$)
Computers Dell Core i7 of 7th Generation
1TB, 2.9 GHZ with a turbo of up to 4
GHZ.
8GB RAM with a hard disk RPM of
about 7200
1200 900,000
Laptops HP Core i7
Hard disk storage of about 500Gb
and a processor of 3.4ghz.
16 GB RAM and supports wireless
connections.
NVIDIA950 display is supported.
50 100,000
Servers IBM Servers come in many varieties and
can be such as the file, web, dynamic
host configuration protocol, DNS and
the proxy servers.
7 9800
Switch Cisco Each will have 48 ports each with an
Ethernet base of about base
30 30000
Iphones cisco - screen display of about 5” with a
graphical TFT color display.
- Support codec G.450 of up to
G.722
150 250,000
Switch Cisco Supports 48 10/100/1000 Ethernet ports,
they have been used for a forwarding
capacity of about 71.4 megabytes per second
25 24000
Routers Cisco Supports up to 20G
- It has two antenna
- Has a frequency channel of
about 2.4ghz and 10Ghz
- Supports all WEP, WPA and
the WPA2
- Its compliant to ABCs
standards of 802.11
1 3725
Cables 3000 Feet 5 rolls 5000
Firewall Cisco RV220w network security firewall
- High performance Gb
Ethernet connections
- 4 ports 10/100/1000
- Supports 802.1Q (VLAN)
2 15000
VPNs Cisco VPN 3002 hardware .where we have
a secure remote connections. It has
VPN aware routers used in
communicating with firewalls in the
routers that will help to permit VPN
traffic legitimacy (Nelson, 2016).
4 4500
Transceiver Cisco 1000Base-T
(Tittel, 2016).-Supporting up to 400
feet.
30 24,000
TOTAL 1,336,025 $
they have been used for a forwarding
capacity of about 71.4 megabytes per second
25 24000
Routers Cisco Supports up to 20G
- It has two antenna
- Has a frequency channel of
about 2.4ghz and 10Ghz
- Supports all WEP, WPA and
the WPA2
- Its compliant to ABCs
standards of 802.11
1 3725
Cables 3000 Feet 5 rolls 5000
Firewall Cisco RV220w network security firewall
- High performance Gb
Ethernet connections
- 4 ports 10/100/1000
- Supports 802.1Q (VLAN)
2 15000
VPNs Cisco VPN 3002 hardware .where we have
a secure remote connections. It has
VPN aware routers used in
communicating with firewalls in the
routers that will help to permit VPN
traffic legitimacy (Nelson, 2016).
4 4500
Transceiver Cisco 1000Base-T
(Tittel, 2016).-Supporting up to 400
feet.
30 24,000
TOTAL 1,336,025 $
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Justification of the selected Hardware’s brand
The reason for choosing Cisco is because is able to offer enough compatibility with the other existing
devices. The cost of cisco items are friendly and that they are easy to afford. Another concept is that the
portability and interoperability is very good when compared to other manufacturers.
The use of HP and Dell is very significant in that they are also affordable and that they are scalable in
case where we need to add additional documents. Dell devices are so durable and that they have longer
warranty when compared with other manufacturers.
Conclusion
The research in this study is about implementing the plan of the proposed network design where we
have to first identify the network design model. The networks design model applied is the three-
hierarchical layer model where we will have to access, distribute and core all the major layers clearly
indicating how they communicate and interconnect across all the devices. If the above design and plans
will be followed then we will be able to implement the anticipated network design of AusEd.
The reason for choosing Cisco is because is able to offer enough compatibility with the other existing
devices. The cost of cisco items are friendly and that they are easy to afford. Another concept is that the
portability and interoperability is very good when compared to other manufacturers.
The use of HP and Dell is very significant in that they are also affordable and that they are scalable in
case where we need to add additional documents. Dell devices are so durable and that they have longer
warranty when compared with other manufacturers.
Conclusion
The research in this study is about implementing the plan of the proposed network design where we
have to first identify the network design model. The networks design model applied is the three-
hierarchical layer model where we will have to access, distribute and core all the major layers clearly
indicating how they communicate and interconnect across all the devices. If the above design and plans
will be followed then we will be able to implement the anticipated network design of AusEd.
References
AdminMuba, 2015. What are Types of Servers ?. [Online]
Available at: http://wifinotes.com/computer-networks/server-types.html
[Accessed 21 May 2018].
Anon., 2010. Subnetting. [Online]
Available at: http://www.tutorialspoint.com/ipv4/ipv4_subnetting.htm
[Accessed 10 September 2017].
Cisco, 2009. Benefits of a Hierarchical Network, s.l.: Cisco.
Cisco, 2012. Cisco Router. [Online]
Available at: http://www.router-switch.com New and Used Cisco network equipment, cisco router,cisco
switch
[Accessed 20 May 2018].
Cisco, 2013. Small Enterprise Design Profile Reference Guide, s.l.: cisco.
CISCO, 2014. Campus Design Summary, Singapore: Cisco.
Coleman, N., 2012. Happy Haven Day care network design proposal, Michigan: Network Solution Inc.
Hope, C., 2017. Router. [Online]
Available at: https://www.computerhope.com/jargon/r/router.htm
[Accessed 03 may 2018].
Hope, C., 2017. Server. [Online]
Available at: https://www.computerhope.com/jargon/s/server.htm
[Accessed 03 May 2018].
JoshWepman, 2015. techwalla. [Online]
Available at: https://www.techwalla.com/articles/what-are-the-benefits-of-hierarchical-network-design
Leon, A., 2015. 5 Fundamental Requirements For High-Performing Networks. A new set of network
essentials is necessary to meet the challenges of today's network administration and management, pp.
23-36.
Macken, T., 2016. Azure Resource Manager and Classic Deployment, s.l.: Microsoft.
Maggie, R., 2014. server. Types of servers, 23(12), pp. 23-40.
Meena, R., 2017. How to configure DHCP , DNS, HTTP Server in Cisco packet tracer along with switches..
Technoheper24, pp. 1-9.
Mitchell, B., 2017. Internet and Network. What is Computer Networking?, pp. 1-3.
Nelson, T., 2016. VPN requirements and components: What do you need to set up a VPN?. [Online]
Available at: https://searchenterprisewan.techtarget.com/photostory/4500270544/The-best-VPNs-for-
enterprise-use/4/VPN-requirements-and-components-What-do-you-need-to-set-up-a-VPN
[Accessed 20 May 2018].
AdminMuba, 2015. What are Types of Servers ?. [Online]
Available at: http://wifinotes.com/computer-networks/server-types.html
[Accessed 21 May 2018].
Anon., 2010. Subnetting. [Online]
Available at: http://www.tutorialspoint.com/ipv4/ipv4_subnetting.htm
[Accessed 10 September 2017].
Cisco, 2009. Benefits of a Hierarchical Network, s.l.: Cisco.
Cisco, 2012. Cisco Router. [Online]
Available at: http://www.router-switch.com New and Used Cisco network equipment, cisco router,cisco
switch
[Accessed 20 May 2018].
Cisco, 2013. Small Enterprise Design Profile Reference Guide, s.l.: cisco.
CISCO, 2014. Campus Design Summary, Singapore: Cisco.
Coleman, N., 2012. Happy Haven Day care network design proposal, Michigan: Network Solution Inc.
Hope, C., 2017. Router. [Online]
Available at: https://www.computerhope.com/jargon/r/router.htm
[Accessed 03 may 2018].
Hope, C., 2017. Server. [Online]
Available at: https://www.computerhope.com/jargon/s/server.htm
[Accessed 03 May 2018].
JoshWepman, 2015. techwalla. [Online]
Available at: https://www.techwalla.com/articles/what-are-the-benefits-of-hierarchical-network-design
Leon, A., 2015. 5 Fundamental Requirements For High-Performing Networks. A new set of network
essentials is necessary to meet the challenges of today's network administration and management, pp.
23-36.
Macken, T., 2016. Azure Resource Manager and Classic Deployment, s.l.: Microsoft.
Maggie, R., 2014. server. Types of servers, 23(12), pp. 23-40.
Meena, R., 2017. How to configure DHCP , DNS, HTTP Server in Cisco packet tracer along with switches..
Technoheper24, pp. 1-9.
Mitchell, B., 2017. Internet and Network. What is Computer Networking?, pp. 1-3.
Nelson, T., 2016. VPN requirements and components: What do you need to set up a VPN?. [Online]
Available at: https://searchenterprisewan.techtarget.com/photostory/4500270544/The-best-VPNs-for-
enterprise-use/4/VPN-requirements-and-components-What-do-you-need-to-set-up-a-VPN
[Accessed 20 May 2018].
requirement, N., 2014. Network Requirements for a Small Office , s.l.: requirements network.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.